SCIENTIFIC-LINUX-ERRATA Archives

March 2012

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Patrick Riehecky <[log in to unmask]>
Reply To:
Date:
Fri, 23 Mar 2012 10:13:28 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (35 lines)
Synopsis:    Important: raptor security update
Issue Date:  2012-03-22
CVE Numbers: CVE-2012-0037


Raptor provides parsers for Resource Description Framework (RDF) files.

An XML External Entity expansion flaw was found in the way Raptor processed
RDF files. If an application linked against Raptor were to open a 
specially-crafted RDF file, it could possibly allow a remote attacker to 
obtain a copy of an arbitrary local file that the user running the
application had access to. A bug in the way Raptor handled external
entities could cause that application to crash or, possibly, execute
arbitrary code with the privileges of the user running the application.
(CVE-2012-0037)

All Raptor users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. All running applications
linked against Raptor must be restarted for this update to take effect.

SL6:
  i386
     raptor-1.4.18-5.el6_2.1.i686.rpm
     raptor-debuginfo-1.4.18-5.el6_2.1.i686.rpm
     raptor-devel-1.4.18-5.el6_2.1.i686.rpm
  x86_64
     raptor-1.4.18-5.el6_2.1.i686.rpm
     raptor-1.4.18-5.el6_2.1.x86_64.rpm
     raptor-debuginfo-1.4.18-5.el6_2.1.i686.rpm
     raptor-debuginfo-1.4.18-5.el6_2.1.x86_64.rpm
     raptor-devel-1.4.18-5.el6_2.1.i686.rpm
     raptor-devel-1.4.18-5.el6_2.1.x86_64.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2